{"created":"2021-01-14T07:50:02.205263+00:00","id":7461,"links":{},"metadata":{"_buckets":{"deposit":"5bf0be05-6af2-47fc-ab83-8a5936ad4ae9"},"_deposit":{"created_by":107,"id":"7461","owner":"107","owners":[107],"owners_ext":{"displayname":"","email":"phyowahwahmyint@ucstaungoo.edu.mm","username":""},"pid":{"revision_id":0,"type":"depid","value":"7461"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/00007461","sets":["1607921555381:1608024197070"]},"communities":["ucstaungoo"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"EAC: Encryption Access Control Scheme for Policy Revocation in Cloud Data","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Since a lot of information is outsourcing into cloud servers, data confidentiality becomes a higher risk to service providers. To assure data security, Ciphertext Policy Attributes-Based Encryption (CP-ABE) is observed for the cloud environment. Because ciphertexts and secret keys are relying on attributes, the revocation issue becomes a challenge for CP-ABE. This paper proposes an encryption access control (EAC) scheme to fulfill policy revocation which covers both attribute and user revocation. When one of the attributes in an access policy is changed by the data owner, the authorized users should be updated immediately because the revoked users who have gained previous access policy can observe the ciphertext. Especially for data owners, four types of updating policy levels are predefined. By classifying those levels, each secret token key is distinctly generated for each level. Consequently, a new secret key is produced by hashing the secret token key. This paper analyzes the execution times of key generation, encryption, and decryption times between non-revocation and policy revocation cases. Performance analysis for policy revocation is also presented in this paper."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Ciphertext Policy Attributes-Based Encryption (CP-ABE), Access Policy, Policy Revocation, Updating Policy Level"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2021-01-14"}],"displaytype":"preview","filename":"pwwm-ICAIT2020.pdf","filesize":[{"value":"450 KB"}],"format":"application/pdf","licensetype":"license_3","url":{"url":"https://meral.edu.mm/record/7461/files/pwwm-ICAIT2020.pdf"},"version_id":"224ec333-e0ed-482d-93cd-cb9a8009aa25"}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"ICAIT 2020","subitem_c_date":"4-5 November 2020","subitem_conference_title":"2020 International Conference on Advanced Information Technologies (ICAIT)","subitem_place":"University of Information Technology, Myanmar","subitem_website":"https://ieeexplore.ieee.org/document/9261809"}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Phyo Wah Wah Myint"},{"subitem_authors_fullname":"Swe Zin Hlaing"},{"subitem_authors_fullname":"Ei Chaw Htoon"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2020-11-04"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"10.1109/ICAIT51105.2020.9261809"},"item_title":"EAC: Encryption Access Control Scheme for Policy Revocation in Cloud Data","item_type_id":"21","owner":"107","path":["1608024197070"],"publish_date":"2021-01-14","publish_status":"0","recid":"7461","relation_version_is_last":true,"title":["EAC: Encryption Access Control Scheme for Policy Revocation in Cloud Data"],"weko_creator_id":"107","weko_shared_id":-1},"updated":"2022-03-24T23:16:39.316185+00:00"}